Publications

Found 4258 results
Author Title [ Type(Asc)] Year
Conference Paper
Frik, A., Malkin N., Harbach M., Peer E., & Egelman S. (2019).  A Promise Is A Promise: The Effect Of Commitment Devices On Computer Security Intentions. Proceedings of CHI '19.
Maire, M., & Yu S. X. (2013).  Progressive Multigrid Eigensolvers for Multiscale Spectral Segmentation.
Stolcke, A., Wooters C., Mirghafori N., Pirinen T., Bulyko I., Gelbart D., et al. (2004).  Progress in Meeting Recognition: The ICSI-SRI-UW Spring 2004 Evaluation System. NIST ICASSP 2004 Meeting Recognition Workshop.
Feldman, J., & Sloan K. R. (1980).  Progress at the Rochester Image Understanding Project. Proceedings of the DARPA Image Understanding Workshop.
Feldman, J., Brown C. M., & Sloan K. R. (1979).  Progress at the Rochester Image Understanding Project. Proceedings of the DARPA Image Understanding Workshop.
Kohler, E., Morris R., & Chen B. (2002).  Programming Language Optimizations for Modular Router Configurations. Proceedings of the Tenth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-X).
Feldman, J., Low J.., & Rovner P. D. (1978).  Programming Distributed Systems. Proceedings of the ACM Annual Conference. 2, 310-317.
Mehta, A., Shenker S. J., & Vazirani V. V. (2003).  Profit Maximizing Multicast Pricing by Approximating Fixed Points (Extended Abstract). Proceedings of the Fourth ACM Conference on Electronic Commerce (EC '03). 218-219.
Sundaresan, S., McCoy D., Afroz S., & Paxson V. (2016).  Profiling Underground Merchants Based on Network Behavior. Proceedings of APWG eCrime 2016.
Dutta, P., Culler D. E., & Shenker S. J. (2007).  Procrastination Might Lead to a Longer and More Useful Life. 1-7.
Doubleday, S., Trott S., & Feldman J. (2017).  Processing Natural Language About Ongoing Actions in ECG. Proceedings of the AAAI 2017 Spring Symposium on Computational Construction Grammar and Natural Language Understanding.
DiCioccio, L., Teixeira R., May M., & Kreibich C. (2012).  Probe and Pray: Using UPnP for Home Network Measurements. 96-105.
Bergen, B. K. (2000).  Probability in phonological generalizations: Modeling optional French final consonants. Proceedings of the 26th Annual Meeting of the Berkeley Linguistics Society.
Renals, S., Morgan N., & Bourlard H. (1991).  Probability Estimation by Feed-forward Networks in Continuous Speech Recognition. Proceedings of the IEEE Workshop on Neural Networks for Signal Processing. 309-318.
Karayev, S., Fritz M., Fidler S., & Darrell T. (2011).  A Probabilistic Model for Recursive Factorized Image Features. 401-408.
Zagordi, O., Töpfer A., Prabhakaran S., Roth V., Halperin E., & Beerenwinkel N. (2012).  Probabilistic Inference of Viral Quasispecies Subject to Recombination. 342-354.
Wendelken, C., & Shastri L. (2000).  Probabilistic inference and learning in a connectionist causal network. Proceedings of the Second International ICSC Symposium on Neural Computation (NC'2000).
Karp, R. M. (1979).  Probabilistic Analysis of Graph-theoretic Algorithms. Proceedings of the Computer Science and Statistics 12th Annual Symposium on the Interface.
Asharov, G., Demmler D., Sachapira M., Schneider T., Segev G., Shenker S. J., et al. (2017).  Privacy-Preserving Interdomain Routing at Internet Scale. Proceedings of PoPETs 2017.
Tahaei, M., Bernd J., & Rashid A. (2022).  Privacy, Permissions, and the Health App Ecosystem: A Stack Overflow Exploration. EuroUSEC. 117-130.
Boehme, R., & Pötzsch S. (2010).  Privacy in Online Social Lending. 23-28.
Gürses, S., Rizk R., & Günther O. (2008).  Privacy Design in Online Social Networks: Learning from Privacy Breaches and Community Feedback.
Tahaei, M., Frik A., & Vaniea K. (2021).  Privacy Champions in Sofware Teams: Understanding Their Motivations, Strategies, and Challenges. CHI Conference on Human Factors in Computing Systems. 2021,
Tahaei, M., Frik A., & Vaniae K. (2021).  Privacy Champions in Software Teams: Understanding Their Motivations, Strategies, and Challenges. Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. 1-15.
Frik, A., Nurgalieva L., Bernd J., Lee J. S., & Schaub F. (2019).  Privacy and Security Threat Models and Mitigation Strategies of Older Adults. Proceedings of SOUPS '19.

Pages